Resubmissions

04/07/2024, 04:25

240704-e11mdavamj 6

04/07/2024, 04:21

240704-ey6qlswele 6

Analysis

  • max time kernel
    106s
  • max time network
    107s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04/07/2024, 04:21

General

  • Target

    silly.exe

  • Size

    98KB

  • MD5

    1ef07f5606ad2f00dac8860c39bc34ad

  • SHA1

    136243d1ec2aa34ffe496ed77bcf046a736fb30d

  • SHA256

    613c4e1384fa9adabf6db2a72556fc996755c1906f33da09ee03294eca4f07e8

  • SHA512

    dc7d9393107c73bde03cd58caef9317a808bd311cf1bb3333cd7e71ed90c13a2044800770d97d525ed04368d8251f36fc123c9c3d8d307566da5faf26eb6e0c6

  • SSDEEP

    3072:z3zEMMRh+uU+XvGVfpXcFzJ3dMO9GeUP0/vG6PDH:z34MShC6+RXE3zPUcv1bH

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\silly.exe
    "C:\Users\Admin\AppData\Local\Temp\silly.exe"
    1⤵
    • Enumerates connected drives
    PID:460
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004E0
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1392
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4380
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
      1⤵
        PID:4064
      • C:\Windows\System32\oobe\UserOOBEBroker.exe
        C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
        1⤵
        • Drops file in Windows directory
        PID:560
      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
        C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
        1⤵
          PID:4568
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DevicesFlow -s DevicesFlowUserSvc
          1⤵
            PID:1988

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/460-0-0x0000000002270000-0x0000000002271000-memory.dmp

            Filesize

            4KB

          • memory/460-1-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB